Filters








56 Hits in 1.7 sec

Security Analysis of SKINNY under Related-Tweakey Settings

Guozhen Liu, Mohona Ghosh, Ling Song
2017 IACR Transactions on Symmetric Cryptology  
In this work, we evaluate the security of SKINNY against differential cryptanalysis in the related-tweakey model.  ...  Next, actual differential trails for SKINNY under related-tweakey model are explored and optimal differential trails of SKINNY-64 within certain number of rounds are searched with an indirect searching  ...  In this work, we focus on the security analysis of SKINNY family of lightweight block ciphers.  ... 
doi:10.46586/tosc.v2017.i3.37-72 fatcat:ekler62d6zbcjndcr5ojb7gkti

Security Analysis of SKINNY under Related-Tweakey Settings (Long Paper)

Guozhen Liu, Mohona Ghosh, Ling Song
2017 IACR Transactions on Symmetric Cryptology  
In this work, we evaluate the security of SKINNY against differential cryptanalysis in the related-tweakey model.  ...  Next, actual differential trails for SKINNY under related-tweakey model are explored and optimal differential trails of SKINNY-64 within certain number of rounds are searched with an indirect searching  ...  In this work, we focus on the security analysis of SKINNY family of lightweight block ciphers.  ... 
doi:10.13154/tosc.v2017.i3.37-72 dblp:journals/tosc/LiuGL17 fatcat:aowr3iihtnhqtgcy6y47uvofmu

The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS [chapter]

Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
2016 Lecture Notes in Computer Science  
We present a new tweakable block cipher family SKINNY, whose goal is to compete with NSA recent design SIMON in terms of hardware/software performances, while proving in addition much stronger security  ...  Secondly, we present MANTIS, a dedicated variant of SKINNY for lowlatency implementations, that constitutes a very efficient solution to the problem of designing a tweakable block cipher for memory encryption  ...  Security Analysis In this section, we provide a short summary of the in-depth analysis we conducted on the security of the SKINNY family of block ciphers.  ... 
doi:10.1007/978-3-662-53008-5_5 fatcat:ksxdbtvcczhffd43ovxtxhw6iy

Cryptanalysis of Reduced round SKINNY Block Cipher

Sadegh Sadeghi, Tahereh Mohammadi, Nasour Bagheri
2018 IACR Transactions on Symmetric Cryptology  
To the best of our knowledge, the presented zero-correlation characteristics in this paper are the first attempt to investigate the security of SKINNY against this attack and the results on the related-tweakey  ...  Also, for SKINNY-n-n and SKINNY-n-2n, we construct 13 and 15-round related-tweakey impossible differential characteristics, respectively.  ...  In this paper, we search for zero-correlation distinguishers [BR14] and the related-tweakey impossible differential characteristics [JD03] which have been missing in the security analysis presented  ... 
doi:10.13154/tosc.v2018.i3.124-162 dblp:journals/tosc/SadeghiMB18 fatcat:fhho3h2h7ffarbywnxng7anuhi

SKINNY-AEAD and SKINNY-Hash

Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
2020 IACR Transactions on Symmetric Cryptology  
To highlight the extensive amount of third-party analysis that SKINNY obtained since its publication, we briefly survey the existing cryptanalysis results for SKINNY-128-256 and SKINNY-128-384 as of February  ...  a very comfortable security margin. https://csrc.nist.gov/Projects/Lightweight-Cryptography  ...  Acknowledgements The work described in this paper has been supported in part by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany's Excellence Strategy -EXC 2092 CASA  ... 
doi:10.13154/tosc.v2020.is1.88-131 dblp:journals/tosc/BeierleJKLMPSSS20 fatcat:u4jtzsxthjgs7gkroyq5o7mv6y

Cryptanalysis of Reduced round SKINNY Block Cipher

Sadegh Sadeghi, Tahereh Mohammadi, Nasour Bagheri
2018 IACR Transactions on Symmetric Cryptology  
To the best of our knowledge, the presented zero-correlation characteristics in this paper are the first attempt to investigate the security of SKINNY against this attack and the results on the related-tweakey  ...  Also, for SKINNY-n-n and SKINNY-n-2n, we construct 13 and 15-round related-tweakey impossible differential characteristics, respectively.  ...  In this paper, we search for zero-correlation distinguishers [BR14] and the related-tweakey impossible differential characteristics [JD03] which have been missing in the security analysis presented  ... 
doi:10.46586/tosc.v2018.i3.124-162 fatcat:kfplm7aqizbwjcsxys3np4vbqa

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo
2019 IACR Transactions on Symmetric Cryptology  
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights.  ...  Moreover, this also implies the existence of integral distinguishers on the same number of rounds. We have applied our technique on round reduced versions of Qarma, Mantis, and Skinny.  ...  The property of linear hulls under the related-key setting was also discussed by Bogdanov et al. in [BBR + 13] .  ... 
doi:10.13154/tosc.v2019.i1.192-235 dblp:journals/tosc/AnkeleDGLLT19 fatcat:ixcmix2zjrhojnn7aj6vid432u

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Leander Gregor, Yosuke Todo
2019 Zenodo  
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights.  ...  Moreover, this also implies the existence of integral distinguishers on the same number of rounds. We have applied our technique on round reduced versions of QARMA, MANTIS, and Skinny.  ...  The property of linear hulls under the related-key setting was also discussed by Bogdanov et al. in [BBR + 13] .  ... 
doi:10.5281/zenodo.2593578 fatcat:rka7qhw4l5b75bnhdfugcixnzi

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo
2019 IACR Transactions on Symmetric Cryptology  
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights.  ...  Moreover, this also implies the existence of integral distinguishers on the same number of rounds. We have applied our technique on round reduced versions of Qarma, Mantis, and Skinny.  ...  The property of linear hulls under the related-key setting was also discussed by Bogdanov et al. in [BBR + 13] .  ... 
doi:10.46586/tosc.v2019.i1.192-235 fatcat:ivshx5lfhjfbdlezsmg743phvy

Cryptanalysis of Forkciphers

Augustin Bariant, Nicolas David, Gaëtan Leurent
2020 IACR Transactions on Symmetric Cryptology  
to the other), but the attack against ForkSkinny uses a weakness of the tweakey schedule in encryption queries (when one branch of the tweakey schedule is skipped).  ...  Then we present the first analysis of ForkSkinny, showing that the best attacks on Skinny can be extended to one round for most ForkSkinny variants, and up to three rounds for ForkSkinny-128-256.  ...  Acknowledgments This project has received funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation program (grant agreement no. 714294 -acronym QUASYModo  ... 
doi:10.13154/tosc.v2020.i1.233-265 dblp:journals/tosc/BariantDL20 fatcat:zwgafu35gjbvxpxtqnztifazia

Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule

Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu
2021 IACR Transactions on Symmetric Cryptology  
Our key-recovery attacks on a few versions of round-reduced SKINNY and ForkSkinny cover 1 to 2 more rounds than the best previous attacks.  ...  In this paper, we try to combine the two phases in a uniform automatic model.Concretely, we apply this idea to automate the related-key rectangle attacks on SKINNY and ForkSkinny.  ...  And Romulus is one of the finalists in the LWC project. So the security analysis of SKINNY is of great importance, which also affects the security evaluation of these candidates.  ... 
doi:10.46586/tosc.v2021.i2.249-291 fatcat:43ui6tm7evbftjoylx4o5djksi

Cryptanalysis of SKINNY in the Framework of the SKINNY 2018–2019 Cryptanalysis Competition [chapter]

Patrick Derbez, Virginie Lallemand, Aleksei Udovenko
2020 Lecture Notes in Computer Science  
In April 2018, Beierle et al. launched the 3rd SKINNY cryptanalysis competition, a contest that aimed at motivating the analysis of their recent tweakable block cipher SKINNY.  ...  Both techniques benefit from the highly biased sets of messages that are provided and that actually correspond to the encryption of various books in ECB mode.  ...  The definition of the tweakey schedule of SKINNY implies that the round tweakeys of all the even rounds (similarly of all the odd rounds) are related together by linear relations.  ... 
doi:10.1007/978-3-030-38471-5_6 fatcat:v7oevhhgyzbxva7kywcpzaxgju

Analysis of AES, SKINNY, and Others with Constraint Programming

Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu
2017 IACR Transactions on Symmetric Cryptology  
As a result, we find 16 related-tweakey impossible differentials for 12-round SKINNY-64-128 based on which we construct an 18-round attack on SKINNY-64-128 (one target version for the crypto competition  ...  6-round AES-128 in the related-key model.  ...  The figure of AES in the paper is produced by TkiZ [Jea16] . The  ... 
doi:10.46586/tosc.v2017.i1.281-306 fatcat:n4hq4vh3pbhobndlzao6wflk54

Analysis of AES, SKINNY, and Others with Constraint Programming

Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu
2017 IACR Transactions on Symmetric Cryptology  
As a result, we find 16 related-tweakey impossible differentials for 12-round SKINNY-64-128 based on which we construct an 18-round attack on SKINNY-64-128 (one target version for the crypto competition  ...  6-round AES-128 in the related-key model.  ...  The figure of AES in the paper is produced by TkiZ [Jea16] . The work of this paper was supported by the National Key  ... 
doi:10.13154/tosc.v2017.i1.281-306 dblp:journals/tosc/SunGLYTQH17 fatcat:txrp6m7oxjbq3nbvcwxzfw4jky

Improved Rectangle Attacks on SKINNY and CRAFT

Hosein Hadipour, Nasour Bagheri, Ling Song
2021 IACR Transactions on Symmetric Cryptology  
CRAFT is another SKINNY-like tweakable block cipher for which we provide the security analysis against rectangle attack for the first time.  ...  Based on the improved boomerang distinguishers for SKINNY, we provide related-tweakey rectangle attacks on 23 rounds of SKINNY-64-128, 24 rounds of SKINNY-128-256, 29 rounds of SKINNY-64-192, and 30 rounds  ...  Nasour Bagheri was supported in part by the Iran National Science Foundation (INSF) under contract No. 98010674.  ... 
doi:10.46586/tosc.v2021.i2.140-198 fatcat:xucyzoijpzapvfs7dcvcwegn3e
« Previous Showing results 1 — 15 out of 56 results